IT Security Compliance Made Easy

Automate Key Elements of Your Information Security Program

From Complexity to Simplicity

Learn More about ComplianceShield

To manage information security compliance today, organizations must either adopt expensive, complex software systems that take months to deploy or piece together disjointed tools from a variety of vendors. Now there is another choice.

ComplianceShield ™ combines our leading Information Security and Privacy Content with a suite of simple, integrated tools that allow you to build, document and track your information security program. Loaded with templates and samples, ComplianceShield lets you quickly develop the documentation you need and then distribute it to users based on their role.

How Does ComplianceShield Automate IT Compliance?

The process of information security governance, risk and compliance (GRC) requires several key management disciplines that must be created and maintained. The following table shows common Compliance Program elements and how ComplianceShield content and features address each area.

Compliance Features

Compliance Requirements

ComplianceShield Features

Document your security program with written information security policies and procedures.

Common Policy Library (CPL) – The CPL is a library of 32 sample information security policies that can easily be customized. Based on Information Security Policies Made Easy, the CPL covers all essential security topics.

Define an information security program that reduces the risk to information assets and addresses compliance requirements.

CPL Control Library – Our CPL control library has over 300 common controls addressing the latest technologies, threats and regulatory requirements. CPL controls can be mapped to frameworks including PCI-DSS, HIPAA, GLBA and ISO 27002

Monitor and track the status of your information security program

Compliance Dashboard – Quickly demonstrate compliance to senior management, auditors and business partners with a few simple reports. Easily view the information security posture of your entire organization in a single
compliance dashboard.

Educate and Train Employees

User Policy Portal – Automatically distribute policies, procedures and training directly to users based on their role within the organization. Users receive a custom inbox with the documents they need.

Develop an incident response program to manage reported incidents.

Incident Management – Track and manage details of information security incidents, including what was affected, incident categorization, date and time of
detection, declaration disclosure and resolution.

Provide periodic security awareness training to all employees and third parties.